Professional Documents
Culture Documents
International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering Vol:7, No:2, 2013
I. INTRODUCTION
International Scholarly and Scientific Research & Innovation 7(2) 2013 290 scholar.waset.org/1999.8/4193
World Academy of Science, Engineering and Technology
International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering Vol:7, No:2, 2013
or more, depending upon its power output and the radio many beacon concepts are operated at fixed intervals [3].
frequency used. When an RFID tag passes through the Software: A consistent intelligent system requires consistent
electromagnetic zone, it detects the readers activation signal. components such as intelligent software for crisis
The reader decodes the data encoded in the tags integrated management, reporting and training the system for different
circuit (silicon chip) and the data is passed to the host conditions. Therefore, genetic algorithm plays a significant
computer for processing. role. In this project, the genetic algorithm of artificial
Tags: There are a variety of RFID tag types. Selecting the intelligence or feedback is used. Genetic algorithms are one of
correct tag will be imperative to ensure a proper functioning the best ways to solve a problem for which little is known.
system. They are a very general algorithm and so will work well in
A tag is comprised of: any search space. All you need to know is what you need the
Silicon chip: Integrated circuit (IC chip) that contains the solution to be able to do well, and a genetic algorithm will be
data. able to create a high quality solution. Genetic algorithms use
Antenna: An antenna is attached to the chip in order to the principles of selection and evolution to produce several
receive and transmit its data. solutions to a given problem [4].
Substrate: This is the paper or plastic film or housing that the
International Science Index, Mechanical and Mechatronics Engineering Vol:7, No:2, 2013 waset.org/Publication/4193
International Scholarly and Scientific Research & Innovation 7(2) 2013 291 scholar.waset.org/1999.8/4193
World Academy of Science, Engineering and Technology
International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering Vol:7, No:2, 2013
In the first phase, all the vehicles that tend to move along
the highway pass under the installed readers on the road lines,
by which the vehicle is reported to the data center. Due to the
vehicle user type, either private or public, the following
operations are done:
International Scholarly and Scientific Research & Innovation 7(2) 2013 292 scholar.waset.org/1999.8/4193
World Academy of Science, Engineering and Technology
International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering Vol:7, No:2, 2013
IV. CONCLUSION
Conducting the above project, the following data is being
sent to the data center:
The exact place of the vehicle and its direction
The vehicles just in time speed
Time and place of the accident
The exact place of the traffic congestion
Drivers status
The capacity of analyzing the data for the crisis stations
The capacity of recording the data history (as the input
feedback in the software)
The key point at stake in the correct analysis and
documented conclusion is the comprehensive and flawless
data in the decision making centers. According to the above
mentioned elements, two significant actions can be conducted.
International Science Index, Mechanical and Mechatronics Engineering Vol:7, No:2, 2013 waset.org/Publication/4193
REFERENCES
[1] A. Aitouche and S. Hayat. Multiagent model using coloured petri nets
for the regulation traffic of an automatedhighway. Journal of Intelligent
Transportation Systems, IEEE, 1:3742, 2003.
[2] Syed Ahson, Mohammad Ilyas, RFID handbook : applications,
technology, security, and privacy,Taylor & Francis Group ,2008
[3] S.Hajeb, P.Parvizi, F.Norouzi Fard, Safe Lines to Transit in Tehrans
BRT, International Journal of Science and Engineering Investigations,
vol. 1, issue 1, pp. 113-118, February 2012.
[4] G. Kotusevski, K.A. Hawick, A Review of Traffc Simulation
Software, in Conf. Information and Mathematical Sciences, New
Zealand, July 23, 2009.
[5] P.Parvizi, P.Parvizi, Tehran-Tabriz Intelligent Highway, International
Journal of Science and Engineering Investigations, vol. 1, issue 1, pp.
58-61, February 2.
[6] S. Wenchao X. Jianmin Y. Feng, An Intelligent Transportation
Simulation System Based on RFID Orientation Technology,
CNKI:SUN:JTJS.0.2009-01-031.
[7] W. Hongjian, T. Yuelin, L. Zhi, RFID Technology Applied in
Highway Traffic Management (Periodical style), Conference on
Fig. 8 Speeding / Speed under minimum / wrong way Optoelectronics and Image Processing, vol. 2, pp. 348-351, November
2010.
[8] Zhang Yan, Modeling Automated Highway Systems with VeriJ, No1,
September 2011.
International Scholarly and Scientific Research & Innovation 7(2) 2013 293 scholar.waset.org/1999.8/4193